PhD in Information Sciences and Technology
Pennsylvania State University, 2018
Article
PP-CSA: Practical Privacy-Preserving Software Call Stack Analysis
Article
Provably Valid and Diverse Mutations of Real-World Media Data for DNN Testing
Article
BinAug: Enhancing Binary Similarity Analysis with Low-Cost Input Repairing
Conference paper
Conference paper
On Extracting Specialized Code Abilities from Large Language Models: A Feasibility Study
Conference paper
Conference paper
Conference paper
Conference paper
Strengthening Supply Chain Security with Fine-Grained Safe Patch Identification
Conference paper
Testing Graph Database Systems via Graph-Aware Metamorphic Relations
Conference paper
Enhancing DNN-Based Binary Code Function Search With Low-Cost Equivalence Checking
Article
sem2vec: Semantics-aware Assembly Tracelet Embedding
Article
ADI: Adversarial Dominating Inputs in Vertical Federated Learning Systems
Conference paper
Conference paper
Byzantine-Robust Federated Learning with Optimal Statistical Rates
Conference paper
CACHEQL: Quantifying and Localizing Cache Side-Channel Vulnerabilities in Production Software
Conference paper
Causality-Aided Trade-Off Analysis for Machine Learning Fairness
Conference paper
CC: Causality-Aware Coverage Criterion for Deep Neural Networks
Conference paper
CCTEST: Testing and Repairing Code Completion Systems
Conference paper
Decompiling x86 Deep Neural Network Executables
Conference paper
Detecting and Repairing Deviated Outputs of Compressed Models
Conference paper
Explain Any Concept: Segment Anything Meets Concept-Based Explanation
Conference paper
Exploring Missed Optimizations in WebAssembly Optimizers
Conference paper
InsightPilot: An LLM-Empowered Automated Data Exploration System.
Conference paper
Conference paper
Metamorphic Shader Fusion for Testing Graphics Shader Compilers
Conference paper
No Free Lunch: On the Increased Code Reuse Attack Surface of Obfuscated Programs
Conference paper
OBSan: An Out-Of-Bound Sanitizer to Harden DNN Executables
Conference paper
Perfce: Performance Debugging on Databases with Chaos Engineering-Enhanced Causality Analysis
Conference paper
PhyFu: Fuzzing Modern Physics Simulation Engines
Conference paper
Precise and Generalized Robustness Certification for Neural Networks
Conference paper
Protecting Intellectual Property of Large Language Model-Based Code Generation APIs via Watermarks
Conference paper
REEF: A Framework for Collecting Real-World Vulnerabilities and Fixes
Conference paper
Revisiting Neuron Coverage for DNN Testing: A Layer-Wise and Distribution-Aware Criterion
Conference paper
RingGuard: Guard io_uring with eBPF
Conference paper
RLTrace: Synthesizing High-Quality System Call Traces for OS Fuzz Testing
Conference paper
Secure Federated Correlation Test and Entropy Estimation
Conference paper
Towards Practical Federated Causal Structure Learning
Conference paper
Unveiling Hidden DNN Defects with Decision-Based Metamorphic Testing
Conference paper
Generating Effective Software Obfuscation Sequences with Reinforcement Learning
Article
Metamorphic Testing of Deep Learning Compilers
Article
NeuralD: Detecting Indistinguishability Violations of Oblivious RAM with Neural Distinguishers
Article
NoLeaks: Differentially Private Causal Discovery under Functional Causal Model
Article
On the effectiveness of testing sentiment analysis systems with metamorphic testing
Article
RansomSOC: A More Effective Security Operations Center to Detect and Respond to Ransomware Attacks
Article
Automated Side Channel Analysis of Media Software with Manifold Learning
Conference paper
Backdoor Investigation and Incident Response: From Zero to Profit
Conference paper
Cache Refinement Type for Side-Channel Detection of Cryptographic Software
Conference paper
Deceiving Deep Neural Networks-Based Binary Code Matching with Adversarial Programs
Conference paper
FED-X2: Privacy Preserving Federated Correlation Test
Conference paper
MDPFuzz: Testing Models Solving Markov Decision Processes
Conference paper
Metamorphic Testing of Deep Learning Compilers
Conference paper
ML4S: Learning Causal Skeleton from Vicinal Graphs
Conference paper
SoK: Demystifying Binary Lifters Through the Lens of Downstream Applications
Conference paper
Torpedo: A Fuzzing Framework for Discovering Adversarial Container Workloads
Conference paper
Unlearnable Examples: Protecting Open-Source Software from Unauthorized Neural Code Learning
Conference paper
Unleashing the Power of Compiler Intermediate Representation to Enhance Neural Program Embeddings
Conference paper
MT-TEQL: Evaluating and Augmenting Neural NLIDB on Real-world Linguistic and Schema Variations
Conference paper
Perception Matters: Detecting Perception Failures of VQA Models Using Metamorphic Testing
Conference paper
Private Image Reconstruction from System Side Channels using Generative Models
Conference paper
SanRazor: Reducing Redundant Sanitizer Checks in C/C++ Programs
Conference paper
How Far We Have Come: Testing Decompilation Correctness of C Decompilers.
Conference paper
Metamorphic Object Insertion for Testing Object Detection Systems
Conference paper
Metamorphic Testing and Certified Mitigation of Fairness Violations in NLP Models
Conference paper
Quantitative Assessment on the Limitations of Code Randomization for Legacy Binaries
Conference paper
Detecting Nondeterministic Payment Bugs in Ethereum Smart Contracts
Article
Automatic Grading of Programming Assignments: A Formal Semantics Based Approach
Conference paper
Identifying cache-based side channels through secret-augmented abstract interpretation
Conference paper
Large-scale Third-party Library Detection in Android Markets
Article
Conference paper
RedDroid: Android Application Redundancy Customization Based on Static Analysis
Conference paper
Software protection on the go: a large-scale empirical study on mobile app obfuscation
Conference paper
Conference paper
Binary code retrofiting and hardening using SGX
Conference paper
CacheD: Identifying Cache-Based Timing Channels in Production Software
Conference paper
Composite software diversification
Conference paper
In-memory fuzzing for binary code similarity analysis
Conference paper
LibD: Scalable and precise third-party library detection in android markets
Conference paper
Semantics-aware machine learning for function recognition in binary code
Conference paper
From Physical to Cyber: Escalating Protection for Personalized Auto Insurance
Conference paper
Conference paper
UROBOROS: Instrumenting Stripped Binaries with Static Reassembling
Conference paper
Conference paper
PP-CSA: Practical Privacy-Preserving Software Call Stack Analysis
Provably Valid and Diverse Mutations of Real-World Media Data for DNN Testing
BinAug: Enhancing Binary Similarity Analysis with Low-Cost Input Repairing
On Extracting Specialized Code Abilities from Large Language Models: A Feasibility Study
Strengthening Supply Chain Security with Fine-Grained Safe Patch Identification
Testing Graph Database Systems via Graph-Aware Metamorphic Relations
ADI: Adversarial Dominating Inputs in Vertical Federated Learning Systems
Byzantine-Robust Federated Learning with Optimal Statistical Rates
CACHEQL: Quantifying and Localizing Cache Side-Channel Vulnerabilities in Production Software
Causality-Aided Trade-Off Analysis for Machine Learning Fairness
CC: Causality-Aware Coverage Criterion for Deep Neural Networks
Detecting and Repairing Deviated Outputs of Compressed Models
Explain Any Concept: Segment Anything Meets Concept-Based Explanation
InsightPilot: An LLM-Empowered Automated Data Exploration System.
Metamorphic Shader Fusion for Testing Graphics Shader Compilers
No Free Lunch: On the Increased Code Reuse Attack Surface of Obfuscated Programs
Perfce: Performance Debugging on Databases with Chaos Engineering-Enhanced Causality Analysis
Precise and Generalized Robustness Certification for Neural Networks
Protecting Intellectual Property of Large Language Model-Based Code Generation APIs via Watermarks
REEF: A Framework for Collecting Real-World Vulnerabilities and Fixes
Revisiting Neuron Coverage for DNN Testing: A Layer-Wise and Distribution-Aware Criterion
RLTrace: Synthesizing High-Quality System Call Traces for OS Fuzz Testing
Unveiling Hidden DNN Defects with Decision-Based Metamorphic Testing
Generating Effective Software Obfuscation Sequences with Reinforcement Learning
NeuralD: Detecting Indistinguishability Violations of Oblivious RAM with Neural Distinguishers
NoLeaks: Differentially Private Causal Discovery under Functional Causal Model
On the effectiveness of testing sentiment analysis systems with metamorphic testing
RansomSOC: A More Effective Security Operations Center to Detect and Respond to Ransomware Attacks
Automated Side Channel Analysis of Media Software with Manifold Learning
Backdoor Investigation and Incident Response: From Zero to Profit
Cache Refinement Type for Side-Channel Detection of Cryptographic Software
Deceiving Deep Neural Networks-Based Binary Code Matching with Adversarial Programs
SoK: Demystifying Binary Lifters Through the Lens of Downstream Applications
Torpedo: A Fuzzing Framework for Discovering Adversarial Container Workloads
Unlearnable Examples: Protecting Open-Source Software from Unauthorized Neural Code Learning
Unleashing the Power of Compiler Intermediate Representation to Enhance Neural Program Embeddings
MT-TEQL: Evaluating and Augmenting Neural NLIDB on Real-world Linguistic and Schema Variations
Perception Matters: Detecting Perception Failures of VQA Models Using Metamorphic Testing
Private Image Reconstruction from System Side Channels using Generative Models
SanRazor: Reducing Redundant Sanitizer Checks in C/C++ Programs
How Far We Have Come: Testing Decompilation Correctness of C Decompilers.
Metamorphic Object Insertion for Testing Object Detection Systems
Metamorphic Testing and Certified Mitigation of Fairness Violations in NLP Models
Quantitative Assessment on the Limitations of Code Randomization for Legacy Binaries
Large-scale Third-party Library Detection in Android Markets
Article
Conference paper
RedDroid: Android Application Redundancy Customization Based on Static Analysis
Conference paper
Software protection on the go: a large-scale empirical study on mobile app obfuscation
Conference paper
Conference paper
Binary code retrofiting and hardening using SGX
Conference paper
CacheD: Identifying Cache-Based Timing Channels in Production Software
Conference paper
Composite software diversification
Conference paper
In-memory fuzzing for binary code similarity analysis
Conference paper
LibD: Scalable and precise third-party library detection in android markets
Conference paper
Semantics-aware machine learning for function recognition in binary code
Conference paper
From Physical to Cyber: Escalating Protection for Personalized Auto Insurance
Conference paper
Conference paper
UROBOROS: Instrumenting Stripped Binaries with Static Reassembling
Conference paper
Conference paper
COMP2011 | Programming with C++ |
COMP4971A | Independent Work |
COMP4981 | Final Year Project |
COMP4981H | Final Year Thesis |
CSIT5730 | Principles of Cybersecurity |
COMP4971A | Independent Work |
COMP4981 | Final Year Project |
COMP4981H | Final Year Thesis |
COMP3632 | Principles of Cybersecurity |
COMP4910 | Co-op Program |
COMP4981 | Final Year Project |
COMP3632 | Principles of Cybersecurity |
COMP4981 | Final Year Project |
No Teaching Assignments |
No Teaching Assignments |
DAI, Yanbo
Computer Science and Engineering
HUANG, Ruixuan
Computer Science and Engineering
LYU, Zongyi
(co-supervision)
Computer Science and Engineering
WANG, Liwen
Computer Science and Engineering
XIE, Yuchong
Computer Science and Engineering
XUE, Zhantong
Computer Science and Engineering
ZAHER, Ahmed Khaled Abdelfattah
Computer Science and Engineering
ZHANG, Kunpeng
Computer Science and Engineering
DENG, Sen
Computer Science and Engineering
LI, Kuan
Computer Science and Engineering
PENG, Yiteng
Computer Science and Engineering
SUN, Ao
Computer Science and Engineering
WANG, Xunguang
Computer Science and Engineering
WANG, Zhaoyu
Computer Science and Engineering
CHEN, Dong
(co-supervision)
Computer Science and Engineering
LU, Hongyi
Computer Science and Engineering
CHEN, Yanzuo
Computer Science and Engineering
JI, Zhenlan
Computer Science and Engineering
LI, Zongjie
Computer Science and Engineering
WONG, Wai Kin
Computer Science and Engineering
XIAO, Dongwei
Computer Science and Engineering
MA, Pingchuan
Computer Science and Engineering( Completed in 2024 )
YUAN, Yuanyuan
Computer Science and Engineering( Completed in 2024 )
LIU, Zhibo
Computer Science and Engineering( Completed in 2023 )
WANG, Huaijin
Computer Science and Engineering( Completed in 2023 )
LI, Sen
Computer Science and Engineering( Completed in 2024 )
LI, Yichen
Computer Science and Engineering( Completed in 2024 )
PANG, Qi
Computer Science and Engineering( Completed in 2022 )
LUNG, Kun Hung
Computer Science and Engineering( Completed in 2021 )
WONG, Wai Kin
Computer Science and Engineering( Completed in 2021 )
Update your browser to view this website correctly. Update your browser now